A. It work with deployed firewalls B. It can be deployed at the perimeter C. It uses signature-based policies D. It can have more restrictive policies than network-based IPS E. It can generate alerts based on behavior at the desktop level F. It can view encrypted files